IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
Opinion
24 Jan 2025
Low-code and AI challenge the reign of SaaS
Software-as-a-service applications have long been the go-to for businesses seeking quick IT fixes, but a new wave of low-code platforms powered by AI and automation is empowering organisations to ditch pre-packaged solutions and build their own custom tools Continue Reading
-
News
23 Jan 2025
Zebra gallops ahead in APAC, driven by automation and e-commerce
Zebra Technologies is riding the wave of e-commerce and automation in APAC, fuelling strong growth with RFID technology, tablets and scanners that boost business productivity and efficiency Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Oct 2023
Telstra to acquire Versent for A$267.5m
The move is expected to bolster Telstra’s enterprise IT services business and support international expansion Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Oct 2023
Teeing up tech at the Ryder Cup
In this week’s Computer Weekly, we go behind the scenes at golf’s Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel ‘betrayed’ by the government’s net-zero policy changes. And we examine the governance challenges behind immerse technologies such as VR and the metaverse. Read the issue now. Continue Reading
-
News
09 Oct 2023
VMware reaffirms commitment to Tanzu
VMware CEO Raghu Raghuram emphasises the importance of having an infrastructure stack capable of supporting applications, with VMware Tanzu playing a pivotal role Continue Reading
By- Aaron Tan, TechTarget
-
News
05 Oct 2023
Microsoft: Nation-state cyber espionage on rise in 2023
Microsoft’s latest Digital Defence Report outlines how nation-state cyber activity has largely moved from destructive attacks to espionage and intelligence gathering Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Oct 2023
Red Cross issues rules of engagement for hackers in conflicts
The digital rules of engagement are the first time cyber activity has been looked at by the conflict watchdog, but a number of hacker groups have already come out and said they will not be following them Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
05 Oct 2023
Lean startup
Lean startup is an approach to building new businesses based on the belief that entrepreneurs must investigate, experiment, test and iterate as they develop products. Continue Reading
By- Mary K. Pratt
- Nicole Laskowski, Senior News Director
-
News
05 Oct 2023
Ransomware dwell times now measured in hours, says Secureworks
Ransomware payloads are now being deployed and executed within 24 hours in more than 50% of cases, according to Secureworks’ annual report Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2023
HPE hones GreenLake strategy with AI moves, hybrid cloud management
HPE has evolved its GreenLake strategy over the past five years, expanding beyond its as-a-service offerings to include a capital purchase model and a strong focus on hybrid cloud management and AI Continue Reading
By- Aaron Tan, TechTarget
-
Feature
04 Oct 2023
Will computational storage meet data processing demands?
Computational storage promises performance for workloads that can benefit from dedicated oomph, but it’s not a cure-all. It may come at a cost, and with added application complexity Continue Reading
-
Feature
04 Oct 2023
Ransomware: All the ways you can protect storage and backup
We survey the key methods of ransomware protection, including immutable snapshots, anomaly detection, air-gapping, anomaly detection, and supplier monetary guarantees Continue Reading
-
News
04 Oct 2023
ICO issues guidance on workplace surveillance
Guidance on employee monitoring covers how employers can conduct their digital surveillance lawfully, transparently and fairly, and warns against businesses intruding on their workers’ private lives Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2023
How Pure Storage is supporting AI workloads
Pure Storage’s cloud-compatible and energy-efficient modular flash storage architecture is well-poised to address the data storage demands of artificial intelligence workloads Continue Reading
By- Aaron Tan, TechTarget
-
News
03 Oct 2023
Cyber experts urge EU to rethink vulnerability disclosure plans
The European Union’s proposed cyber security vulnerability disclosure measures are well-intentioned but ultimately counterproductive, as making unmitigated vulnerabilities public knowledge increases the risk of their exploitation by various actors, experts claim Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2023
Public sector needs systemic reform of capacity to innovate
Improving the public sector’s capacity to innovate requires a culture of innovation underpinned by people, skills and new ways of working with the private sector Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2023
CIISec scores DSIT funding to expand successful CyberEPQ scheme
DSIT has committed to enhanced funding to expand CIISec’s CyberEPQ education programme after recording excellent results to date Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
03 Oct 2023
Where next for quantum computing?
In this week’s Computer Weekly, we talk to the head of Amazon’s Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now. Continue Reading
-
News
02 Oct 2023
CDO interview: Lalo Luna, global head of strategy and insights, Heineken
The brewing giant is building a data ecosystem to bring new insights to the business and to make the most of emerging developments in artificial intelligence capabilities Continue Reading
By -
News
02 Oct 2023
Versity targets Exabyte volumes in data archiving
Versity builds archiving for Exabyte data volumes on tape and in object storage. It has built its own S3 and transitioned to a GPL licence for supercomputing archives Continue Reading
By- Pierre Berlemont
- Antony Adshead, Storage Editor
-
News
02 Oct 2023
How the Australian government is approaching AI
The Australian government is experimenting with AI use cases in a safe environment while it figures out ways to harness the technology to benefit citizens and businesses Continue Reading
By- Aaron Tan, TechTarget
-
Definition
29 Sep 2023
strategic sourcing
Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Susan Fogarty, Senior Director
-
News
29 Sep 2023
Scottish watchdog urges wider biometric oversight
Scotland’s biometrics watchdog urges Scottish Parliament to extend oversight of biometric information to include the entire criminal justice system, not just police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Sep 2023
Businesses disconnected from realities of API security
Business leaders feel confident they’ve got a handle on API security, but at the same time, incidents are through the roof, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Sep 2023
How Akamai is driving growth in APAC
Akamai's managing director for the region outlines the company’s growth journey, how it sets itself apart from competitors, and its strategies to drive the next phase of growth Continue Reading
By- Aaron Tan, TechTarget
-
Feature
28 Sep 2023
Automated cloud IR: Empowering cyber with AI-powered playbooks
As cyber threats increasingly target cloud infrastructure, demand for robust and reliable incident response measures is through the roof. Find out why you might want to consider bringing artificial intelligence into play Continue Reading
By -
Opinion
28 Sep 2023
Security Think Tank: To encrypt or not to encrypt, that is the question
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
By -
Feature
28 Sep 2023
Cloud NAS, what is it good for?
We look at NAS file access storage, how it works, what it’s good for and the possibilities to access storage for files and unstructured data in the public cloud Continue Reading
-
News
28 Sep 2023
Security and risk management spending to grow 14% next year
Growth in public cloud services will stand out over the next 12 months, as Gartner projects an overall 14% increase in cyber spending in 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Sep 2023
Yahoo picks Intigriti to run crowdsourced bug bounty programme
Digital media brand Yahoo is setting up a crowdsourced bug bounty programme with ethical hacking specialist Intigriti, and is reaching out to the Capture the Flag community to participate Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2023
Researchers offer free threat briefings on Vegas casino hackers
Permiso, a cloud detection and response startup, is making its threat intel team available to speak on Scattered Spider, the group behind recent cyber attacks on MGM Resorts and Caesars Entertainment Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2023
City of Las Vegas masters cyber incident response with Darktrace
The high-rolling city of Las Vegas experiences unique cyber security challenges rarely seen elsewhere. CIO Mike Sherwood reveals how he turned to Darktrace to help address incidents quicker and with confidence Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
26 Sep 2023
IBM reorients to offset historic storage hardware decline
Storage profile: We look at IBM and the strategic shifts it has made towards the cloud, cloud-native and as-a-service offerings that aim to reverse a long-term decline in revenues Continue Reading
By- Antony Adshead, Storage Editor
-
News
26 Sep 2023
UK government quietly disbands data ethics advisory board
The government has disbanded its Centre for Data Ethics and Innovation’s advisory board in favour of pulling the relevant artificial intelligence (AI) and data knowledge from a pool of external experts Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Sep 2023
Sony alleged victim of new extortion gang
A little-known threat actor claims it has breached IT systems and networks at electronics and entertainment giant Sony, and is threatening to release the organisation’s data unless paid off Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2023
Kubernetes storage: It’s object or nothing for MinIO
SAN and NAS are finished in the age of the cloud when it comes to cloud-native Kubernetes storage, according to container-focused object storage maker MinIO Continue Reading
By- Pierre Berlemont
- Antony Adshead, Storage Editor
-
News
26 Sep 2023
Cover-ups still the norm in the wake of a cyber incident
Almost half of organisations that have experienced a cyber incident did not report it to the appropriate authorities, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2023
Crest and IASME to deliver upcoming NCSC Cyber Exercise programme
Crest and IASME have been tasked with assuring that security services providers signing up to a soon-to-launch NCSC Cyber Incident Exercising scheme are up to the job Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
26 Sep 2023
Preparing for post-quantum cryptography
In this week’s Computer Weekly, our latest buyer’s guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now. Continue Reading
-
Opinion
25 Sep 2023
Security Think Tank: Three ways to identify the best encryption use cases
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
By- Mandy Andress, Elastic
-
News
25 Sep 2023
Apple fixes three vulnerabilities found by spyware researchers
Apple has patched three more vulnerabilities uncovered by spyware and surveillance researchers at The Citizen Lab Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2023
Annual Security Serious Awards nominations announced
Annual Security Serious Awards will recognise the professionals and organisations doing the most to safeguard and advance cyber security, as well as those committed to diversity and mental health in the industry Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2023
UK-US data bridge to open to traffic on 12 October
Government forges ahead with the implementation of the UK-US data bridge, which will come into effect for real just under three weeks from now Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2023
Cyber experts set out plan to secure future US elections
A group of experts are setting out to enhance election cyber security in the United States, and restore public faith in a process tainted by interference and misinformation in the past Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2023
Lords begin inquiry into large language models
Lords will examine the risks and opportunities of large language models and look at how government can effectively manage them in the coming years Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
22 Sep 2023
Fear is the mind-killer: Governance key to safety in the cyber dunes
Whether you’re tasked with protecting your organisation against cyber threats or ravenous subterranean worms, getting the basics of governance and risk management right counts for a lot and choosing the right framework will remove a huge burden from security teams and executives Continue Reading
By- Peter Woollacott
-
News
21 Sep 2023
‘Top’ ransomware gangs favour smaller businesses
Despite high-profile attacks on prominent organisations, the world’s most prolific ransomware operations tend to target smaller businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2023
Poor digital experience a blocker for cyber resilience
Organisations that neglect the digital employee experience are not only vulnerable to employee attrition, but putting themselves at increased cyber risk, an Ivanti report finds Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
20 Sep 2023
Toyota car plant outage shows database capacity planning is vital
How could database deletes and re-organisation take out car production for 36 hours at 14 plants? We drill down into the details of database capacity planning Continue Reading
By- Antony Adshead, Storage Editor
-
News
20 Sep 2023
Organisations failing to proactively address insider cyber risk
Organisations are spending less than 10% of their annual security budgets on trying to solve one of the costliest problems in cyber: insider risk Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2023
Okta confirms link to cyber attacks on Las Vegas casinos
Okta CISO David Bradbury confirms widespread speculation about the high-profile cyber attacks on two Las Vegas casino operators, revealing that the threat actors responsible had indeed abused its services as they earlier claimed Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2023
38TB Microsoft data leak highlights risks of oversharing
An accidentally disclosed SAS token with excessive privileges enabled researchers to access nearly 40TB of Microsoft’s data, highlighting the risks of privilege mismanagement and oversharing Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2023
Nominet and European counterparts link up on intelligence sharing
The new European TLD ISAC, a collaborative project between top-level domain providers across Europe, aims to enhance their collective security posture to better protect internet users Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
19 Sep 2023
Securing Eurovision’s online voting system against cyber attacks
In this week’s Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer’s guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Also, HCLTech’s Ashish Gupta relates how the company has embraced a new, pandemic-influenced, remote working model. And we find out how retail tech leaders influence their boards on transformation projects. Read the issue now. Continue Reading
-
Guest Post
18 Sep 2023
Why cloud governance is shifting to business stakeholders
Balancing value creation with innovation is a constant challenge for organizations. Here's what to consider when evaluating the long-term business value of cloud governance. Continue Reading
By- Parthiv Shah
-
News
18 Sep 2023
Unregulated DeFi services abused in latest pig butchering twist
Pig butchering scammers are taking advantage of the unregulated nature of DeFi crypto trading apps to siphon off even more money from their victims, according to the latest findings of an ongoing investigation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Sep 2023
Security Think Tank: A user’s guide to encryption
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
18 Sep 2023
Government seeks industry views on cyber threat to UK CNI
The Science, Innovation and Technology Select Committee is seeking evidence from the cyber sector as it launches an inquiry into the resilience of the UK's critical national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Sep 2023
Is the metaverse bad for the environment? Exploring a VR world
While the metaverse has negative impacts on the environment, some believe it can also aid in sustainability efforts. Take a look at these complex issues. Continue Reading
-
News
15 Sep 2023
Las Vegas mainstay Caesars Palace likely paid off ransomware crew
Caesars Entertainment, owner of the lavish Roman Empire-themed Caesars Palace casino in Las Vegas, has revealed it also suffered a ransomware attack, and appears to have paid off its hackers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2023
Manchester police data breach a classic supply chain incident
The developing data breach at Greater Manchester Police follows a cyber attack on the systems of a key supplier of ID services to the force Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
14 Sep 2023
CW APAC – Trend Watch: Datacentre sustainability
Sustainability targets are becoming more pertinent than ever. In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at how firms are approaching the topic, why STT GDC is building its largest datacentre in the Philippines, OVHCloud’s India project and the impact of generative AI. Continue Reading
-
Feature
14 Sep 2023
Are NFTs bad for the environment? Carbon, energy and more
Like blockchain, NFTs have a negative reputation when it comes to the environment. Learn why and whether that negative impact has changed in the last few years. Continue Reading
-
News
14 Sep 2023
Data on over 3,000 Airbus suppliers leaked after breach
An emergent threat actor has leaked details of multiple sensitive Airbus suppliers after claiming to have accessed the firm’s systems having hacked customer Turkish Airlines Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2023
BlackCat on the hook for cyber attack that crippled Vegas casinos
The ALPHV/BlackCat ransomware operation claimed responsibility for an attack that forced MGM Resorts to shut down systems at some of Las Vegas’ most popular gambling venues Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2023
Google, Microsoft and Mozilla push browser updates to foil zero-day
A zero-day in Google’s Chrome browser was first reported by surveillance researchers at The Citizen Lab and Apple, but also affects other browsers Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2023
As vehicle safety regulations loom, carmakers fret over cyber risks
Global, UN-backed car safety and security regulations come into force next year, and automotive bosses say they are not only unprepared, but “swamped” by a tide of compliance and security risks Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
GitHub fixes race condition that could have led to ‘repojacking’
A subtle flaw in how GitHub handled repository creation and user renaming could have had serious consequences for the open source community, but has now been fixed. Learn more about how it worked Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
BianLian ransomware gang holds Save the Children hostage
The dangerous and prolific BianLian ransomware gang claims to have stolen almost 7TB of data from NGO Save the Children, but thankfully the charity’s vital work on the ground appears to be unaffected Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
Storm-0324 gathers over Microsoft Teams
An initial access broker associated with several different ransomware operations is now conducting Microsoft Teams phishing attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
NCSC and ICO sign MoU to forge deeper collaborative links
The scope of the MoU signed by the NCSC and the ICO includes collaboration on new cyber regulations and guidance, and how to support cyber attack victims appropriately and minimise regulatory penalties Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
Patch Tuesday: Microsoft fixes zero-days in Word and Streaming Service
September 2023 brings a light Patch Tuesday, with two zero-days and five critical vulnerabilities listed in the latest release Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2023
ExtraHop open sources 16 million rows of threat domain data
NDR specialist ExtraHop says making its entire machine learning dataset available for anybody to view will help organisations better defend against cyber attacks originating from malicious domains generated by algorithms Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2023
Ancient MoD IT systems could cause supply issues for frontline troops
Deliveries of inventory to the front line are being put at risk due to legacy IT systems and poor data, according to the National Audit Office Continue Reading
By -
News
12 Sep 2023
Whitehall only capable of ‘piecemeal’ digital transformation, says PAC
The Public Accounts Committee is unconvinced government will achieve its digital transformation ambitions as progress is thwarted by staff shortages and a lack of senior leadership engagement Continue Reading
By -
News
12 Sep 2023
US casino giant MGM Resorts battles 36-hour outage after cyber attack
Multiple systems at US hotel and casino operator MGM went down in the wake of the incident on 10 September, crippling several of Las Vegas’ most prominent casinos Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
12 Sep 2023
The dangers of breaking encryption
In this week’s Computer Weekly, we detail the concerns of the BCS and other IT experts about the UK’s Online Safety Bill’s proposals to weaken end-to-end message encryption. Our buyer’s guide continues to look at the issues around integrating software-as-a-service applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Red Hat’s CEO Matt Hicks retails the company’s efforts to support generative AI. And we discover how immersive technologies can shape a brave new world of training and design. Read the issue now. Continue Reading
-
News
12 Sep 2023
IT spending in Australia to grow 7.8% in 2024
The growth will be led by investments in cyber security, cloud, analytics and application modernisation as Australian CIOs look to improve cost and operational efficiencies Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Sep 2023
Brits happy to break cyber law if the price is right
A study conducted ahead of an upcoming security trade fair reveals a slim majority of Brits would come out in favour of offensive government security ops and even engage in cyber criminality themselves in the right circumstances Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2023
Professional ransomware gangs clearly a threat, but attacks can be easily stopped
NCSC and NCA report reveals insight into business models and underpinnings of ransomware gangs and their affiliates, but also urges defenders to take heart, as stopping a ransomware attack is not that hard to do Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2023
UK boardrooms and CISOs increasingly aligned on cyber risks
Board members and CISOs in UK organisations seem to be working together much better, but while this is an encouraging sign, there remain some areas of concern over how the two relate to each other Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2023
Salesforce and Zoom embrace ethical hackers. You should, too
Software companies Salesforce and Zoom discuss their successful bug bounty programmes, what they learned at a recent in-person hackathon in which they participated, and why others shouldn’t be scared of hackers Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Sep 2023
AI-powered cloud SIEM: Real-time threat intel boosts defences
Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Continue Reading
By -
News
08 Sep 2023
KPMG finds growing demand for emerging tech
KPMG’s latest global tech report reveals an increase in the number of businesses adopting emerging technologies Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Sep 2023
Deputy PM urges UK plc not to lose focus on cyber
In a speech at TechUK, deputy prime minister Oliver Dowden urges the cyber security community not to lose focus, and to do more to further collaboration across sectors Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2023
North Koreans using new zero-day to target security researchers
A threat actor linked to the North Korean government is continuing a long-running campaign targeting legitimate security researchers, using an as-yet undisclosed zero-day vulnerability to gain access to their victims Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2023
HGS to provide contact centre support for One Login
The partnership between the Government Digital Service and Hinduja Global Solutions will see the supplier provide contact centre services for the digital identity platform Continue Reading
By -
Feature
08 Sep 2023
SME disaster recovery: Five key points to consider
We look at key DR considerations for SMEs, including RPOs, RTOs, infrastructure needed for effective continuity and the right combination of cloud and in-house provision Continue Reading
-
Definition
07 Sep 2023
servant leadership
Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control. Continue Reading
By- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
News
07 Sep 2023
Honeywell goes quantum to protect utilities from future threats
Honeywell and quantum computing specialist Quantinuum will integrate quantum-hardened encryption keys into future smart meters Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2023
UK and US slap fresh sanctions on Conti ransomware crew
London and Washington DC have imposed sanctions on 11 more members of the cyber criminal gang behind the Conti ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Sep 2023
CW EMEA: The value of valuing people
In this month’s CW EMEA ezine, we look at HR software and strategies that can help combat staff attrition, find out how Finland’s and Sweden’s plans to join NATO have initiated activity in the Nordic cyber security sector already, consider the data privacy challenges associated with generative AI, and find out why it is important for companies to implement new cryptography standards now in preparation for quantum-safe communication. Read the issue now. Continue Reading
-
News
07 Sep 2023
Government AI taskforce appoints new advisory board members
An initial progress report published by the Taskforce provides detail on new appointments to its external advisory board as well as rebrand to focus on “frontier” artificial intelligence Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
07 Sep 2023
CXL in the datacentre: Boosting memory for hungry workloads
We look at CXL, how it revolutionises connectivity between memory components, potentially saves energy, and adds oomph to heavily memory-dependent workloads such as AI analytics Continue Reading
-
News
07 Sep 2023
Microsoft finds Storm-0558 exploited crash dump to steal signing key
Microsoft has published new information on how the Chinese state threat actor Storm-0558 was able to exploit a rare race condition following a crash dump in order to acquire a consumer signing key Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2023
Singapore taps Lidar and laser scanning in remote building inspections
With the 3D data generated reality capture technologies, detailed inspections can be conducted remotely, eliminating the need for inspectors from technical authorities to be present onsite Continue Reading
By- Aaron Tan, TechTarget
-
Quiz
06 Sep 2023
10 blockchain quiz questions: Test your understanding
IT leaders are increasingly faced with learning how to implement blockchain in their organizations. Use this blockchain quiz to test your knowledge. Continue Reading
By- Guilliean Pacheco, Associate Site Editor
-
News
06 Sep 2023
Meet the professional BEC op that targeted Microsoft 365 users for years
The so-called W3LL cyber crime operation ran a phishing empire that has played a large role in compromising Microsoft 365 accounts for years. Its activities are now coming to light thanks to Group-IB researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Sep 2023
Okta customers targeted in new wave of social engineering attacks
Authentication specialist Okta has warned customers to be on alert for a campaign of social engineering attacks exploiting highly privileged users Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
05 Sep 2023
HPE storage comes with full IT stack, hybrid cloud and as a service
Storage profile: We look at HPE, its Alletra storage refresh, and Greenlake and the ways the company is re-branding as a full-stack provider across on-prem and hybrid cloud Continue Reading
By- Antony Adshead, Storage Editor
-
News
05 Sep 2023
Executive interview: ManageEngine president Rajesh Ganesan on the ‘three Ws’ of digital change
Today's IT management model must assume that the workforce can operate from any workplace and use any workload with ease and security, as the security and service management software supplier explains Continue Reading
By- Melisa Osores, Managing Editor para América Latina
-
News
05 Sep 2023
Researchers find flaw in Mend.io security platform
WithSecure’s research team uncovered an authentication flaw in an application security platform developed by Mend.io, which has now been fixed Continue Reading
By- Alex Scroxton, Security Editor